S Vhaduri, SV Dibbo, W Cheung - Ieee Access, 2021 - ieeexplore.ieee.org
… -wearables either do not have any userauthentication or … of a hierarchical implicit user authentication (HIAuth) system … in most of the market wearables. While this work demonstrates the …
… Furthermore, involving wearables and IoT devices makes it possible to use multiple authentication factors, such as user’s position, his behavior and the state of the surrounding …
SV Dibbo, W Cheung, S Vhaduri - … on Safety and Security with IoT …, 2022 - Springer
… authentication system for the wearables leveraging the sensing and computation power of smartphones and IoT … The core piece of this implicit wearableuserauthentication system is a …
… users will wear minimum 5 wearables in 2020. Moreover, 60% believe that wearables in the next … of two different user utilized for device authentication between two wearable devices of …
… model uses three types of cryptosystems to achieve the mutual authentication, user … anonymous userauthentication scheme for the communication on the InternetofThings (IoT) based …
… userauthentication in wearable devices. Overall, in this survey, we systematically study assorted state-of-the-art userauthentication methods for wearable … with an IoT platform to monitor …
… new lightweight authentication scheme suitable for wearable … a user to mutually authenticate his/her wearable device(s) … same user) for secure communication between the wearable de…
… of works have been proposed for the use of biometrics in continuous userauthentication [11], [12], … His research interests include continuous authentication, and IoT security/privacy, and …
M Shahzad, MP Singh - IEEE Internet Computing, 2017 - ieeexplore.ieee.org
… Compared with traditional gaitrecognition systems, which use cameras, floor sensors, or wearable sensors to capture gait information, WifiU is easier to deploy and has better coverage. …